Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

Detailed Table of Contents for Certificate in

Cybersecurity Policy

Developed and Prepared by


First Atlantic Cybersecurity Institute
7429 Lighthouse Pt, Pittsburgh, USA
www.facyber.com

Email: info@facyber.com

Enroll Here: http://facyber.com/product/certificate-in-


cybersecurity-policy/

Page 1 of 9
Chapter -1 Structure of Information Systems

COMPUTER FUNDAMENTALS

1.1WORKING PROCESS OF COMPUTER [ VIDEO ]

1.2ORGANIZATION OF COMPUTER

1.3COMPUTER PERIPHERALS & SOFTWARE

1.4OPERATING SYSTEM & ARCHITECTURE

1.5COMPUTER LANGUAGE

FUNDAMENTAL OF INTERNET

1.6HISTORY OF INTERNET

1.7SERVICE OF INTERNET

1.8WEB ADDRESS AND WEB BROWSER

NUMBER SYSTEM

1.9BINARY NUMBER SYSTEM

1.10DECIMAL NUMBER SYSTEM

1.11OCTAL NUMBER SYSTEM

1.12HEXADECIMAL NUMBER SYSTEM

1.13CONVERSION BETWEEN NUMBER SYSTEM

1.14WHAT IS INFORMATION SYSTEM?

1.15IMPORTANCE OF IS - BUSINESS PERSPECTIVE/PROCESS

1.16INFORMATION SYSTEM TO SOLVE MANAGEMENT ISSUES

MISCELLANEOUS

1.17ANALYZING & IMPROVING EXISTING BUSINESS STRATEGY

1.18IMPROVING DECISION MAKING USING GATHERED INFORMATION

1.19INFORMATION SYSTEM STRUCTURE MODEL

1.20RISK MANAGEMENT

1.21BUSINESS CONTINUITY & PLANNING

Page 2 of 9
1.22DISASTER RECOVERY

Chapter -2 Information Security & Network Vulnerabilities

ACCESS CONTROL TECHNIQUES

2.1WHAT IS ACCESS CONTROL ? [ VIDEO ]

2.2REQUIREMENT OF ACCESS CONTROL

2.3ACCESS CONTROL TECHNIQUE

ACCOUNT ADMINISTRATION

2.4CREATING NEW ACCOUNTS

2.5ACCOUNT MAINTENANCE
2.6ACCOUNT, LOG, AND JOURNAL MONITORING
2.7ACCESS RIGHTS AND PERMISSIONS
ACCOUNT ACCESSIBILITY

2.8IDENTIFICATION

2.9AUTHENTICATION
2.10AUTHORIZATION
AUTHENTICATION TECHNIQUES

2.11PASSWORD

2.12BIOMETRICS
2.13RFID CARD
2.14TOKEN
NETWORKING & TYPES

2.15WHAT IS NETWORKING AND ITS BENEFITS?

2.16TYPES OF NETWORK

ISO MODEL

2.17LAYERS OF OSI MODEL

2.18THE OSI MODEL FOR NETWORKING

Page 3 of 9
NETWORKING DEVICES & TOPOLOGIES

2.19NETWORK DEVICES

2.20NETWORK TOPOLOGY

IP ADDRESS

2.21WHAT IS IP ADDRESS?

2.22PUBLIC AND PRIVATE IP ADDRESSES


MAC ADDRESS & PORTS

2.23PORTS & SERVICES

2.24HOW TO FIND OPEN PORTS ON YOUR OWN SYSTEM


2.25WHAT IS MAC ADDRESS?
2.26HOW TO FIND MAC ADDRESS IN WINDOWS AND LINUX?
DNS & DHCP SERVER

2.27DNS & DHCP SERVER

NETWORK VULNERABILITIES & TYPES OF ATTACKS

2.28WHAT IS VULNERABILITY?

2.29TYPES OF NETWORK VULNERABILITIES AND THEIR EFFECTS

2.30LIST OF TOOLS

2.31TYPES OF ATTACKS

2.32COUNTERMEASURE FOR NETWORK VULNERABILITIES AND NETWORK ATTACKS

Chapter -3 Foundation of Cybersecurity

HACKING

3.1DEFINE HACKING [ VIDEO ]

3.2HACKING VS ETHICAL HACKING


3.3UNDERSTANDING THE PURPOSE OF ETHICAL HACKING
3.4TYPES OF HACKERS
3.5WHAT DO ETHICAL HACKERS DO?

Page 4 of 9
3.6GOALS ATTACKERS TRY TO ACHIEVE

THE PHASE OF ETHICAL HACKING

3.7INFORMATION GATHERING

3.8SCANNING

3.9GAINING ACCESS

3.10MAINTAINING ACCESS

3.11COVERING TRACKS

TESTING, CYBER WARFARE & CYBER TERRORISM

3.12WHITE BOX TESTING

3.13GRAY BOX TESTING

3.14BLACK BOX TESTING


3.15CYBERWARFARE AND CYBERTERRORISM
3.16EFFECTS OF CYBERWARFARE & CYBERTERRORISM

3.17PREVENTION OF CYBERWARFARE & CYBERTERRORISM

3.18DISSECTING CYBER RISK


3.19CYBERSECURITY THREATS
SECURITY IMPLEMENTATION

3.20SECURITY IMPLEMENTATION

IT GOVERNANCE & MANAGEMENT FRAMEWORKS (COBIT 5 & DSS05)

3.21IT GOVERNANCE & MANAGEMENT FRAMEWORKS (COBIT 5 & DSS05)

INCIDENT HANDLING & MANAGEMENT

3.22INCIDENT HANDLING & MANAGEMENT

GOVERNMENT ROLE IN CYBERSECURITY

3.23GOVERNMENT ROLE IN CYBERSECURITY

ENTERPRISE CYBERSECURITY STRATEGY

3.24ENTERPRISE CYBERSECURITY STRATEGY

Page 5 of 9
Chapter -4 BYOD & SMAC Security

SMAC

4.1INTRODUCTION TO SMAC [ VIDEO ]

4.2OBJECTIVES

4.3SOCIAL

4.4SMAC- MOBILE

4.5SMAC- ANALYTICS

4.6SMAC- CLOUD

4.7SMAC BENEFITS AND IMPORTANCE

4.8CHALLENGE AND SOLUTIONS

4.9SMAC IMPLEMENTATION

4.10SMARTPHONE FORENSIC AND BACKUPS

BYOD

4.11WHAT IS BYOD?

4.12NEW TRENDS

4.13BYOD IN ENTERPRISE

4.14ADVANTAGE

4.15DISADVANTAGE

4.16POLICY AND STANDARD FOR BYOD

4.17BYOD SECURITY CHALLENGES AND MITIGATION STRATEGY

4.18COMMON PRACTICE FOR BYOD

4.19BYOD SECURITY & POLICIES

Chapter -5 Preventing Cyber Intrusion

PREVENTING CYBER INTRUSION

Page 6 of 9
5.1WHAT IS CYBER ATTACK ? [ VIDEO ]

5.2CYBER ATTACK RESPONSE PLAN

5.3COMPLIANCE PLAN AGAINST CYBER ATTACK

5.4TECHNOLOGY FOR PREVENTING CYBER INTRUSION

Chapter -6 Evaluating Emerging Cybersecurity Technology

EVALUATING EMERGING CYBERSECURITY TECHNOLOGY

6.1EVALUATING EMERGING CYBERSECURITY TECHNOLOGY INTRODUCTION [ VIDEO ]

6.2CHANGING TRENDS IN CYBERSECURITY

6.3SOCIAL MEDIA ROLE IN CYBERSECURITY

6.4CYBERSECURITY TECHNIQUES

6.5CYBER ETHICS

Chapter -7 Ethics in Information Technology

ETHICS IN INFORMATION TECHNOLOGY

7.1DEFINITION OF ETHICS [ VIDEO ]

7.2THE DIFFERENCE BETWEEN MORALS, ETHICS, AND LAWS

7.3THE IMPORTANCE OF INTEGRITY

7.4ETHICS IN BUSINESS

7.5ETHICS IN INFORMATION TECHNOLOGY

7.6POLICY

Chapter -8 Security policy analysis

SECURITY POLICY ANALYSIS

8.1SECURITY POLICY [ VIDEO ]

8.2PURPOSE OF POLICY

Page 7 of 9
8.3SECURITY POLICY VS. LAWS

8.4WHAT POLICY SHOULD COVER?

8.5POLICY DEVELOPMENT PROCESS

8.6POLICY DEVELOPMENT LIFE-CYCLE

8.7SECURITY POLICY ISSUES

8.8POLICIES TYPES

8.9POLICY STANDERS

8.10POLICY TROUBLESHOOTING

Chapter -9 Security Policy Implementation

SECURITY POLICY IMPLEMENTATION

9.1IDENTIFY THE ISSUES/THREATS [ VIDEO ]

9.2IDENTIFY THE USERS FOR THE POLICY

9.3REVIEW & WRITE THE POLICY

9.4TRAIN YOUR EMPLOYEE FOR THE POLICY

9.5ENFORCE AND MONITORING THE POLICY

9.6REVIEW AND MODIFY POLICY ON REQUIREMENT

Chapter -10 Global Cybersecurity Policy & Law

GLOBAL CYBERSECURITY

10.1INTRODUCTION [ VIDEO ]

10.2CYBERSPACE AND CYBERCRIMES

10.3INFORMATION WARFARE AND LEGAL ISSUES

10.4STRUCTURE AND WORKING TECHNIQUES

10.5NATIONAL CYBERSECURITY POLICY & LAW

10.6INTERNATIONAL LAW AND POLICY

Page 8 of 9
10.7LEGAL PROCESS & PUNISHMENT

Chapter -11 Enterprise Cybersecurity Policy

CYBERSECURITY POLICY

11.1ENTERPRISE CYBERSECURITY POLICY [ VIDEO ]

11.2REVIEWING EXISTING CYBERSECURITY POLICY

11.3VULNERABILITY ASSESSMENT & RISK ANALYSIS

11.4SECURITY TESTING FRAMEWORKS

11.5VULNERABILITY PREVENTION

11.6RESPONSE TIME TO ATTACK

11.7TOOLS AND TECHNIQUES FOR SECURING THE ENTERPRISE NETWORK

11.8TRAIN YOUR EMPLOYEES

11.9CONCLUSION

Chapter -12 EXAM

Page 9 of 9

You might also like